General

  • Target

    a40a0e0e802a3eca6f60f8dc6c438c147c9be6966b05024d8fced74c64b22087

  • Size

    152KB

  • Sample

    240420-gzmegaba9s

  • MD5

    0c6e74d6876e26c6c6e1feda3a5c7b4b

  • SHA1

    00e4d30063d5b50d905e99fd2afd89099af1910a

  • SHA256

    a40a0e0e802a3eca6f60f8dc6c438c147c9be6966b05024d8fced74c64b22087

  • SHA512

    7358980aba81afe241f029ec298a64039761b65c62329c1f9719c311c5fe63cd6b3960e635f7e12dbf130fd6b810f78f2f7152cb4cb415f254938ea7b036d49f

  • SSDEEP

    3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

Malware Config

Targets

    • Target

      a40a0e0e802a3eca6f60f8dc6c438c147c9be6966b05024d8fced74c64b22087

    • Size

      152KB

    • MD5

      0c6e74d6876e26c6c6e1feda3a5c7b4b

    • SHA1

      00e4d30063d5b50d905e99fd2afd89099af1910a

    • SHA256

      a40a0e0e802a3eca6f60f8dc6c438c147c9be6966b05024d8fced74c64b22087

    • SHA512

      7358980aba81afe241f029ec298a64039761b65c62329c1f9719c311c5fe63cd6b3960e635f7e12dbf130fd6b810f78f2f7152cb4cb415f254938ea7b036d49f

    • SSDEEP

      3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks